Home

Description

ciguard is a static security auditor for CI/CD pipelines. From 0.8.0 to 0.8.1 , the discover_pipeline_files() function in src/ciguard/discovery.py walks a directory tree following symlinks, with cycle protection via tracking visited resolved paths. An attacker who can plant a symlink in a directory the user (or AI agent) scans can cause discovery to walk into the symlink target and return paths to pipeline-shaped files outside the requested root. This vulnerability is fixed in 0.8.2.

PUBLISHED Reserved 2026-05-05 | Published 2026-05-12 | Updated 2026-05-13 | Assigner GitHub_M




LOW: 3.2CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:N

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

>= 0.8.0, < 0.8.2
affected

References

github.com/...iguard/security/advisories/GHSA-8cxw-cc62-q28v exploit

github.com/...iguard/security/advisories/GHSA-8cxw-cc62-q28v

cve.org (CVE-2026-44220)

nvd.nist.gov (CVE-2026-44220)

Download JSON